Challenges in designing trustworthy cryptographic co-processors. Chaves, R., Natale, G. D., Batina, L., Bhasin, S., Ege, B., Fournaris, A. P., Mentens, N., Picek, S., Regazzoni, F., Rozic, V., Sklavos, N., & Yang, B. In 2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015, Lisbon, Portugal, May 24-27, 2015, pages 2009–2012, 2015. IEEE. Paper doi bibtex @inproceedings{DBLP:conf/iscas/GravesNBBEFMPRR15,
author = {Ricardo Chaves and
Giorgio Di Natale and
Lejla Batina and
Shivam Bhasin and
Baris Ege and
Apostolos P. Fournaris and
Nele Mentens and
Stjepan Picek and
Francesco Regazzoni and
Vladimir Rozic and
Nicolas Sklavos and
Bohan Yang},
title = {Challenges in designing trustworthy cryptographic co-processors},
booktitle = {2015 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
2015, Lisbon, Portugal, May 24-27, 2015},
pages = {2009--2012},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/ISCAS.2015.7169070},
doi = {10.1109/ISCAS.2015.7169070},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iscas/GravesNBBEFMPRR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"RFfCQau8EWkoWDzxr","bibbaseid":"chaves-natale-batina-bhasin-ege-fournaris-mentens-picek-etal-challengesindesigningtrustworthycryptographiccoprocessors-2015","author_short":["Chaves, R.","Natale, G. D.","Batina, L.","Bhasin, S.","Ege, B.","Fournaris, A. P.","Mentens, N.","Picek, S.","Regazzoni, F.","Rozic, V.","Sklavos, N.","Yang, B."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Ricardo"],"propositions":[],"lastnames":["Chaves"],"suffixes":[]},{"firstnames":["Giorgio","Di"],"propositions":[],"lastnames":["Natale"],"suffixes":[]},{"firstnames":["Lejla"],"propositions":[],"lastnames":["Batina"],"suffixes":[]},{"firstnames":["Shivam"],"propositions":[],"lastnames":["Bhasin"],"suffixes":[]},{"firstnames":["Baris"],"propositions":[],"lastnames":["Ege"],"suffixes":[]},{"firstnames":["Apostolos","P."],"propositions":[],"lastnames":["Fournaris"],"suffixes":[]},{"firstnames":["Nele"],"propositions":[],"lastnames":["Mentens"],"suffixes":[]},{"firstnames":["Stjepan"],"propositions":[],"lastnames":["Picek"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]},{"firstnames":["Vladimir"],"propositions":[],"lastnames":["Rozic"],"suffixes":[]},{"firstnames":["Nicolas"],"propositions":[],"lastnames":["Sklavos"],"suffixes":[]},{"firstnames":["Bohan"],"propositions":[],"lastnames":["Yang"],"suffixes":[]}],"title":"Challenges in designing trustworthy cryptographic co-processors","booktitle":"2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015, Lisbon, Portugal, May 24-27, 2015","pages":"2009–2012","publisher":"IEEE","year":"2015","url":"https://doi.org/10.1109/ISCAS.2015.7169070","doi":"10.1109/ISCAS.2015.7169070","timestamp":"Fri, 09 Apr 2021 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/iscas/GravesNBBEFMPRR15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/iscas/GravesNBBEFMPRR15,\n author = {Ricardo Chaves and\n Giorgio Di Natale and\n Lejla Batina and\n Shivam Bhasin and\n Baris Ege and\n Apostolos P. Fournaris and\n Nele Mentens and\n Stjepan Picek and\n Francesco Regazzoni and\n Vladimir Rozic and\n Nicolas Sklavos and\n Bohan Yang},\n title = {Challenges in designing trustworthy cryptographic co-processors},\n booktitle = {2015 {IEEE} International Symposium on Circuits and Systems, {ISCAS}\n 2015, Lisbon, Portugal, May 24-27, 2015},\n pages = {2009--2012},\n publisher = {{IEEE}},\n year = {2015},\n url = {https://doi.org/10.1109/ISCAS.2015.7169070},\n doi = {10.1109/ISCAS.2015.7169070},\n timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/iscas/GravesNBBEFMPRR15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Chaves, R.","Natale, G. D.","Batina, L.","Bhasin, S.","Ege, B.","Fournaris, A. P.","Mentens, N.","Picek, S.","Regazzoni, F.","Rozic, V.","Sklavos, N.","Yang, B."],"key":"DBLP:conf/iscas/GravesNBBEFMPRR15","id":"DBLP:conf/iscas/GravesNBBEFMPRR15","bibbaseid":"chaves-natale-batina-bhasin-ege-fournaris-mentens-picek-etal-challengesindesigningtrustworthycryptographiccoprocessors-2015","role":"author","urls":{"Paper":"https://doi.org/10.1109/ISCAS.2015.7169070"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","dataSources":["H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5"],"keywords":[],"search_terms":["challenges","designing","trustworthy","cryptographic","processors","chaves","natale","batina","bhasin","ege","fournaris","mentens","picek","regazzoni","rozic","sklavos","yang"],"title":"Challenges in designing trustworthy cryptographic co-processors","year":2015}